Create an incident response triage toolkit for use with Windows or Linux, without violating any license agreements or copyright restrictions.
A collection of scripts that can be used to create a toolkit for incident response and volatile data collection. This includes bash scripts to create a Linux toolkit, and Batch scripts to create a Windows toolkit.
- Dowload and extract the zip.
- Open a shell, and change directory to wherever the zip was extracted.
- Run the script.
Note: Steps 1-3 should be run on a non-involved machine, preferably before an incident even occurs. The toolkit it creates should be stored on a USB drive or similar location, where it can be used in case an incident does occur.
Once the toolkit has been created, you can use it by opening a shell in the directory where the toolkit is stored, and starting the volatile data collection script:
Be sure the directory in which you choose to save the volatile data has plenty of space (several GB, at least), as the script will dump the contents of the system's memory, and store several other files of varying sizes. Both Windows and Linux scripts accomplish the same basic tasks (see tasks.txt), and both follow the order of volatility (OOV) for data collection as much as possible. They also create detailed, timestamped logs of the commands executed, and create sha256 checksums of the files saved to the storage directory. Be prepared for the scripts to run for a while, as it may take some time to image and compute a checksum of the system's memory.